Skip to main content

Data Operation and Management Practices in Ping an Group

  • Conference paper
  • First Online:
Edge Computing – EDGE 2023 (EDGE 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14205))

Included in the following conference series:

  • 71 Accesses

Abstract

In the context of the rapid development of information technology and the era of big data, data has transformed into a key asset for enterprises. As one of China’s largest comprehensive financial service providers, Ping An Group has been committed to promoting data compliance management and the protection of personal information. The group has built a comprehensive data management system to ensure the compliant use of data while helping the business develop efficiently. This article introduces in detail Ping An Group’s “one system + four mechanisms” data management and operation system. It also focuses on the main practices and important results achieved in the group’s data compliance operations, personal information protection, and data interaction management. The experience shows how to achieve efficient data flow and maximize corporate benefits while complying with laws and regulations, providing valuable reference for other financial and quasi-financial companies.

* Jiang Xin is the head of the data management team of the Security Center of Ping An Group’s Science and Technology Association. He joined Ping An Group in 2020 and has been responsible for the Group's data management and personal information protection since 2021, and has promoted the construction of the Group’s data compliance system, mechanism, and application system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ximei, W., Fujia, D.: Interpretation of the personal information protection law in the era of big data. J. Jiaozuo Univ. 2, 12–16 (2023)

    MATH  Google Scholar 

  2. Yue, S.: Enterprise data compliance and its construction in the era of digital economy. Hubei Soc. Sci. 8, 119–128 (2022)

    MATH  Google Scholar 

  3. Qianshi, W.: Analysis of data compliance management path based on personal information protection. Cult. Educ. Mater. 6, 192–195 (2022)

    MATH  Google Scholar 

  4. Weiqun, H.: Personal Information Protection based on Classification and Grading. Inf. Secur. Commun. Priv. 10, 107–114 (2021)

    MATH  Google Scholar 

  5. Yixiao, M.: Research on data protection compliance system. J. National Prosecutor’s Coll. 2, 84–100 (2022)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiang Xin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sensen, Z., Kai, W., Xin, J. (2024). Data Operation and Management Practices in Ping an Group. In: Feng, J., Jiang, F., Luo, M., Zhang, LJ. (eds) Edge Computing – EDGE 2023 . EDGE 2023. Lecture Notes in Computer Science, vol 14205. Springer, Cham. https://doi.org/10.1007/978-3-031-51826-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-51826-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-51825-6

  • Online ISBN: 978-3-031-51826-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics